Overview
overview
10Static
static
10Battly-Lau...in.exe
windows11-21h2-x64
10resources/...e.json
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...Me.txt
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...ds.ejs
windows11-21h2-x64
3resources/...ex.css
windows11-21h2-x64
3resources/...n.icns
windows11-21h2-x64
3resources/...on.ico
windows11-21h2-x64
3resources/...on.png
windows11-21h2-x64
3resources/...nd.png
windows11-21h2-x64
3resources/...ar.png
windows11-21h2-x64
3resources/...de.png
windows11-21h2-x64
3resources/...en.png
windows11-21h2-x64
3resources/...es.png
windows11-21h2-x64
3resources/...fr.png
windows11-21h2-x64
3resources/...it.png
windows11-21h2-x64
3resources/...jp.png
windows11-21h2-x64
3resources/...pt.png
windows11-21h2-x64
3resources/...ru.png
windows11-21h2-x64
3resources/...de.png
windows11-21h2-x64
3resources/...en.png
windows11-21h2-x64
3resources/...dex.js
windows11-21h2-x64
3resources/.../de.js
windows11-21h2-x64
3resources/.../en.js
windows11-21h2-x64
3resources/.../es.js
windows11-21h2-x64
3resources/.../fr.js
windows11-21h2-x64
3resources/.../it.js
windows11-21h2-x64
3resources/.../pt.js
windows11-21h2-x64
3resources/...ain.js
windows11-21h2-x64
3resources/...r.html
windows11-21h2-x64
5Analysis
-
max time kernel
86s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-09-2024 00:03
Behavioral task
behavioral1
Sample
Battly-Launcher-win.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
resources/app/node_modules/color-name/package.json
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
resources/app/node_modules/protocol/package.json
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
resources/app/node_modules/windows-shortcuts/lib/shortcut/ReadMe.txt
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
resources/app/node_modules/windows-shortcuts/package.json
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
resources/app/package.json
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
resources/app/src/ads.ejs
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
resources/app/src/assets/css/index.css
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
resources/app/src/assets/icon.icns
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
resources/app/src/assets/icon.ico
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
resources/app/src/assets/icon.png
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
resources/app/src/assets/images/background.png
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
resources/app/src/assets/images/flags/ar.png
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
resources/app/src/assets/images/flags/de.png
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
resources/app/src/assets/images/flags/en.png
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
resources/app/src/assets/images/flags/es.png
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
resources/app/src/assets/images/flags/fr.png
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
resources/app/src/assets/images/flags/it.png
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
resources/app/src/assets/images/flags/jp.png
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
resources/app/src/assets/images/flags/pt.png
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
resources/app/src/assets/images/flags/ru.png
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
resources/app/src/assets/images/opera_banner_de.png
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
resources/app/src/assets/images/opera_banner_en.png
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
resources/app/src/assets/js/index.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
resources/app/src/assets/js/langs/de.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
resources/app/src/assets/js/langs/en.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
resources/app/src/assets/js/langs/es.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
resources/app/src/assets/js/langs/fr.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
resources/app/src/assets/js/langs/it.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
resources/app/src/assets/js/langs/pt.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
resources/app/src/assets/js/main.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
resources/app/src/header.html
Resource
win11-20240802-en
General
-
Target
resources/app/src/assets/css/index.css
-
Size
20KB
-
MD5
9338a403220d934986f5dc738419174d
-
SHA1
33d0a93608f28900b4771b49d88259b2f70350e7
-
SHA256
2f281d5eb03f52a46514089fd0b0af408f02613a8fcef8d506dc01f590651d7c
-
SHA512
cd92d15c6ee9d6d9ed78fa073406462d5f3b33cc9c198a693fa51f53889ba9f5ef2a498ea3f033ef7cad73b1248e4bad9afcad8246f5b98dcde3435399dca508
-
SSDEEP
192:zIPPOBM/UfNLh38L6wLLd949+cZaxYPrunqm0LJ4nqBDmwsNSflfBWG+ngBmb:UFUf7ML6hPrDz+KfBWtg0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2824 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 4204 wrote to memory of 2824 4204 cmd.exe NOTEPAD.EXE PID 4204 wrote to memory of 2824 4204 cmd.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\resources\app\src\assets\css\index.css1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\resources\app\src\assets\css\index.css2⤵
- Opens file in notepad (likely ransom note)
PID:2824
-